the dns security mess d j bernstein university of
play

The DNS security mess D. J. Bernstein University of Illinois at - PDF document

The DNS security mess D. J. Bernstein University of Illinois at Chicago The Domain Name System fsf.org wants to see http://www.redhat.com . Browser at fsf.org The web server www.redhat.com has IP


  1. The DNS security mess D. J. Bernstein University of Illinois at Chicago

  2. � The Domain Name System fsf.org wants to see �� �� http://www.redhat.com . �� �� Browser at fsf.org “The web server www.redhat.com has IP address �� �� �� �� 96.6.144.112.” Administrator at redhat.com Now fsf.org retrieves web page from IP address 96.6.144.112.

  3. � Same for Internet mail. fsf.org has mail to deliver to �� �� someone@redhat.com . �� �� Mail client at fsf.org “The mail server for redhat.com has IP address �� �� �� �� 66.187.233.32.” Administrator at redhat.com Now fsf.org delivers mail to IP address 66.187.233.32.

  4. � Forging DNS packets fsf.org has mail to deliver to �� �� someone@redhat.com . �� �� Mail client at fsf.org “The mail server for redhat.com has IP address �� �� �� �� 157.22.245.20.” Attacker anywhere on network Now fsf.org delivers mail to IP address 157.22.245.20, actually the attacker’s machine.

  5. Actually: Client sends query; attacker has to repeat some bits from the query.

  6. Actually: Client sends query; attacker has to repeat some bits from the query. Network probably has at least one attacker-controlled machine. That machine sniffs network, trivially forges DNS packets.

  7. Actually: Client sends query; attacker has to repeat some bits from the query. Network probably has at least one attacker-controlled machine. That machine sniffs network, trivially forges DNS packets. “No sniffers on my network!” : : : so a blind attacker guesses the bits to repeat, eventually gets lucky. After analysis, optimization: blind forgery is about as easy as downloading a movie.

  8. Amazing news Tuesday 2 June 2009: “.ORG becomes the first open TLD to sign their zone with : : : Today we reached DNSSEC a significant milestone in our effort to bolster online security for the .ORG community. We are the first open generic Top-Level Domain to successfully sign our zone with Domain Name Security Extensions (DNSSEC). To date, the .ORG zone is the largest domain registry to implement this needed security measure.”

  9. “What does it mean that the .ORG Zone is ‘signed’? Signing our zone is the first part of our DNSSEC test phase. We are now cryptographically signing the authoritative data within the .ORG zone file. This process adds new records to the zone, which allows verification of the origin authenticity and integrity of data.”

  10. Cryptography! Authority! Verification! Authenticity! Integrity! Sounds great!

  11. Cryptography! Authority! Verification! Authenticity! Integrity! Sounds great! Now I simply configure the new .org public key into my DNS software. Because the .org servers are signing with DNSSEC, it is no longer possible for attackers to forge data from those servers!

  12. Cryptography! Authority! Verification! Authenticity! Integrity! Sounds great! Now I simply configure the new .org public key into my DNS software. Because the .org servers are signing with DNSSEC, it is no longer possible for attackers to forge data from those servers! ... or is it?

  13. Let’s find a .org server: $ dig +short ns org d0.org.afilias-nst.org. b0.org.afilias-nst.org. a0.org.afilias-nst.info. c0.org.afilias-nst.info. b2.org.afilias-nst.org. a2.org.afilias-nst.info. $ dig +short \ b0.org.afilias-nst.org 199.19.54.1

  14. Look up one of my domains: $ dig \ www.mwisc.org @199.19.54.1 Everything looks normal: ;; AUTHORITY SECTION: mwisc.org. 86400 IN NS d.ns.mwisc.org. mwisc.org. 86400 IN NS f.ns.mwisc.org. ;; ADDITIONAL SECTION: d.ns.mwisc.org. 86400 IN A 131.193.36.21 f.ns.mwisc.org. 86400 IN A 131.193.36.24

  15. Now ask for signatures: $ dig +dnssec \ www.mwisc.org @199.19.54.1 Same answer as before, plus four new records: h9p7u7tr2u91d0v0ljs9l1gid np90u3h.org. 86400 IN TYP E50 \#39 0101000104D399EA AB148A77C7ACEFCBC55446032 B2D961CC5EB6821 EF2600072 2000000000290 h9p7u7tr2u91d0v0ljs9l1gid np90u3h.org. 86400 IN RRS

  16. IG TYPE50 7 2 86400 20090 70721303120090623203031 3 7493 org. lkzaiDXNZExggNf W3PFLNRP8WPTECXUWH0tktDjX thkE60pm6LoTOrRq TgfwK7NS 4GjN98rwqKH7iCfRr09CJ1BzC XIdtWn5W0T0mtgwp413YF2O r O06RmDbXzbPcA5NXTsMk6b7fL AHzRYEPBdBt1x3XJAZAPkrBPN 7dx2W w+g= 1b8fe79t5m6vkn6eo6s0n3gb7 mls aicq.org. 86400 IN TY PE50 \#38 0101000104D399E AAB140ADEA6FED9985FAABFED

  17. FA1D4E4B147C5D83 D2C90006 400000000002 1b8fe79t5m6vkn6eo6s0n3gb7 mlsaicq.org. 86400 IN RRS IG TYPE50 7 2 86400 20090 70115442820090617144428 3 7493 org. Yv5+u5gugBuwP7V r2PE5/LdLIbi5GuWr8j9wl0pI ExHBrYbL+BkD7Nv6 LhahOv7i nS1yhgmLJC8ySj5gMghnZXxzP v6WvQlcjUj1nukPtU+tqUXE s KwAdzgizMu14qM36UMMhl8P3U W4YzAJdoplJk9Ml3Oo7bYMdS3 P5gC3 FOw=

  18. These .org signatures are 1024-bit RSA signatures. 2003: Shamir–Tromer et al. concluded that 1024-bit RSA was already breakable by large companies and botnets. $10 million: 1 key/year. $120 million: 1 key/month. 2003: RSA Laboratories recommended a transition to 2048-bit keys “over the remainder of this decade.” 2007: NIST made the same recommendation.

  19. Will be a few years before 1024-bit RSA is breakable by academics in small labs. They’re finishing RSA-768 now.

  20. Will be a few years before 1024-bit RSA is breakable by academics in small labs. They’re finishing RSA-768 now. “RSA-1024: still secure against honest attackers.”

  21. Will be a few years before 1024-bit RSA is breakable by academics in small labs. They’re finishing RSA-768 now. “RSA-1024: still secure against honest attackers.” What about serious attackers using many more computers? e.g. botnet operators? I say: Using RSA-1024 is irresponsible.

  22. But that’s not the biggest problem with the DNSSEC signatures in .org .

  23. But that’s not the biggest problem with the DNSSEC signatures in .org . Suppose an attacker forges a DNS packet from .org , including exactly the same DNSSEC signatures but changing the NS+A records to point to the attacker’s servers.

  24. But that’s not the biggest problem with the DNSSEC signatures in .org . Suppose an attacker forges a DNS packet from .org , including exactly the same DNSSEC signatures but changing the NS+A records to point to the attacker’s servers. Fact: DNSSEC “verification” won’t notice the change. The signatures say nothing about the NS+A records. The forgery will be accepted.

  25. What did .org sign? The signature for mwisc.org says “ .org might have data with hashes between 1b39ggevfp3b72r9r901o1osqddn4ben and 1bfadvmpj1fqlfvdv8eksiokfheo7km9 but has not signed any of it.” mwisc.org has a hash in that range. .org now has thousands of these useless signatures. This is .org “implementing” a “needed security measure.”

  26. The Internet has about 78000000 *.com names.

  27. The Internet has about 78000000 *.com names. Surveys by DNSSEC developers, last updated 2009.06.24, have found 241 *.com names with DNSSEC signatures. > 116. 116 on 2008.08.20; 241

  28. The Internet has about 78000000 *.com names. Surveys by DNSSEC developers, last updated 2009.06.24, have found 241 *.com names with DNSSEC signatures. > 116. 116 on 2008.08.20; 241 “DNSSEC: Fifteen years of development. Millions of dollars of U.S. government grants (DISA, NSF, DHS, etc.). Hundreds of users.”

  29. What went wrong? Some of the Internet’s DNS servers are extremely busy: e.g., the root servers, the .com servers, the google.com servers. Can they afford crypto? Hmmm. DNSSEC tries to minimize server-side costs by precomputing signatures of DNS records. “No per-query crypto.” Signature is computed once; saved; sent to many clients. Hopefully the server can afford to sign each DNS record once.

  30. Clients don’t share the work of verifying a signature. DNSSEC tries to reduce client-side costs through choice of crypto primitive. Many DNSSEC crypto options: 640-bit RSA, original specs; 768-bit RSA, many docs; 1024-bit RSA, current RFCs (for “leaf nodes in the DNS”); DSA, “10 to 40 times as slow for verification” but faster for signatures.

  31. DNSSEC made breakable choices such as 640-bit RSA for no reason other than fear of server overload. DNSSEC needed more options to survive the inevitable breaks. Profusion of options made DNSSEC crypto complicated, hard to review for bugs. 2009: Emergency BIND upgrade. Minor software bug meant that DNSSEC DSA signatures had always been trivial to forge.

  32. My main point today: DNSSEC’s fear of overload forced DNSSEC down a path of unreliability, insecurity, and unusability. This is why DNSSEC has been a failure.

  33. My main point today: DNSSEC’s fear of overload forced DNSSEC down a path of unreliability, insecurity, and unusability. This is why DNSSEC has been a failure. My main point Saturday: Per-query crypto leads to a much simpler protocol with much higher reliability, much higher security, and much higher usability.

  34. My main point today: DNSSEC’s fear of overload forced DNSSEC down a path of unreliability, insecurity, and unusability. This is why DNSSEC has been a failure. My main point Saturday: Per-query crypto leads to a much simpler protocol with much higher reliability, much higher security, and much higher usability. Can still handle the loads using state-of-the-art crypto.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend